Characteristics and operations of some of the malicious software

What are some of the characteristics and operations of some of the malicious software that exists today?